Uber Can Track Devices, Even After You Delete the App

Uber Can Track Devices, Even After You Delete the App

Uber has been in hot water for quite some time now following remarks made by the CEO Travis Kalanick that had users believing the company did not care to help employees affected by President Trump’s Travel Ban.

Quickly a protest spread across social media, users of the popular ride-sharing app urged others to delete the application from their devices as a way to pressure Kalanick into denouncing the Ban and helping those affected by it. Members of Twitter posted screenshots of their devices while deleted the app with the hashtag #DeleteUber. Over 200,000 people deleted the app, but as it turns out, it isn’t so easy to shake Uber.

Even after you have deleted the app from your device, the company can still track your location, according to recent New York Times article. Kalanick asked his employees to breach the rules of Apple by secretly identifying and tagging iPhones even after its app has been deleted and the devices erased, a technique known as fingerprinting.

When someone uninstalls an app that uses fingerprinting, it leaves behind a small piece of code that can be used as an identifier if the app is ever reinstalled on the device.

Kalanick calls it a fraud detection maneuver, but it violated Apple’s privacy guidelines. At the time, it was a good way for the company to keep track of individual phones that some drivers used to make fake accounts, boost the number of rides they accepted and make more money.

To keep Apple from finding out about the secret data stealing software, Uber engineers allegedly built a digital fence around the company’s offices.

In a meeting with Tim Cook in 2014, Kalanick found out that he and his engineers were busted. Cook threatened to pull the app off Apple’s App Store, a move that would have cost Uber millions of iPhone customers – essentially destroying the company’s business.

In a recent statement, the company says it doesn’t track users who delete the app, but also said that “being apple to recognize known bad actors… is an important security measure.”

It is unclear if Uber is still using the data stealing technique on “bad actors.”

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.